The Predicate Structure to Represent the Intention for Software

Size: px
Start display at page:

Download "The Predicate Structure to Represent the Intention for Software"

Transcription

1 The Predicate tructure to Represent the Intention for oftware Fumio Negoro The Institute of Computer Based oftware Methodology and Technology Abstract The requirement in this study is a sentence written in a natural language. This is a methodology to determine programs by mechanically extracting words from the requirement, where the words are nouns in the sentence. The program is called cenario Function (F). F is a set of propositions. The proposition is determined with the predicate structure that takes a noun as its variable. The predicate structure has been derived from this study. The nouns used as variables are clues to realize on F the meaning and the functionality contained in the sentence. The requirement that cannot be expressed only with the nouns is realized by the complementary action of the propositions, which is realized when F is executed on computer. In other words, the most of the work required in the conventional ways of software development such as requirement definition, logical design, program design and tests, can be eliminated and is no longer the primary part of software development with this methodology. As a result, a human work in software development can be changed into a work with less burdens.. The Core of non-engineering hypothesis In this section, the core of the hypothesis is briefly mentioned. We have studies what an intention is. The conclusion is that an intention is made when a correspondence between two worlds is made and that the two worlds are materialized with a set of particular elements. Time has a variety of velocities that are independent elements. The elements are nonexistent to us. These elements are the elements of the two worlds. The separation of the worlds is made based on the difference of the time velocity. One of the worlds is called the connotational world and the other is the denotational world. If a correspondence is made between the two worlds, that state becomes an intention. At that moment, the elements in the connotational world are objectified. The objectified element cannot return to the state that it has been objectified. The behavior of the objectified elements is the whole of the object of our cognition. However, we are unable to cognize the whole. entences, requirements and natural languages consist of the objects; therefore, they are never complete as they cannot represent the whole. The model to realize this hypothesis is the Consciousness Model, where the above hypothesis is made into axioms. []. TDM and F According to the axioms, a requirement is a set of objects reflecting the intention. Therefore, it is not that we are able determine a requirement autonomously. All depends upon the intention. The purpose of this study is to find a language to represent the intention. However, in this paper, a methodology to represent the intention in a programming language is presented. The scheme is to be realized, which simultaneously satisfies a process of reversing a requirement that comes to someone s mind at a certain moment to the world where the intention has been made, and a process of enabling the creation of a requirement that fully reflects the intention. A structure is to be realized, which leaves the above processes to an action of computer, manifests a requirement into the memory of computer, and makes the intention in the mind of the computer users. The scheme is defined as Three- Dimension-like pace Model (TDM) by the axiomism, and it is expressed in a programming language so as to leave it to a computer. This is the cenario Function (F). [] [] TDM is a static state of the aforementioned scheme, and F is the same. F changes a static state of itself into a dynamic structure on computer. TDM and F on execution realize the hypothesis of the Consciousness Model. The two worlds are placed in the space in TDM, and nouns are placed on the three coordinates of TDM. The rules of placement of the nouns are determined according to the nature of each coordinate. The nature of the coordinate is derived from the axioms. There exist the particular elements in the two separate spaces in the TDM. Those elements are not cognizable.

2 However, a certain correspondence is made between the nouns on the coordinates and the elements. The correspondence is also defined by the axioms. This correspondence is the predicate structure. The predicate structure is a structure to redefine the nouns as the hypothesized elements. When this predicate structure becomes propositions, they are called ignification Vectors. The origin of TDM is determined when the intention is made and objectification of elements is done. In other words, the intention means a closed boundary line of a certain domain according to our definition, and the inside of the domain corresponds to the connotational world and the outside corresponds to the denotational world. A set of the origins of TDM corresponds to the boundary line. Therefore, execution of F simultaneously defines the origins and a set of them. The meaning of execution of F can be explained in another way. If the number of object of someone s requirement is N, F is determined by N, whereas when F is executed, N N objects are created by the complementary action as a possible number of the objects. In the conventional ways, only N objects can be turned into programs and the N object must be determined logically beforehand. On the contrary, with this methodology, N ignification Vectors are determined deterministically and N N objects are realized.. Definition of F F is a structure to realize TDM by using computer. F can be defined based on a set of nouns that manifest a certain psychological state. A screen and a file are a set of nouns. They become a basis to define F. To develop software concludes to define F. In the following, a general structure of F is defined. F a =Φ[Φ({L(j)}+{O(r)}+{(a)}+R) +Φ({L(i)}+{I(r)}+R) +Φ({L(j)}+ {RR, RD, RM, RC})] a Herein, {L(j)}, {O(r) }, {(a)}, R, {L(i)}, {I(r)}, R, {L(j)} and {RR, RD, RM, RC} are generally called Tense Control Vector. There are kinds in all. L(j), L(i) and L(j) are called ignification Vectors, whereas the rest of the Tense Control Vectors are generally called Action Vectors. O(r), I(r) and (a) are Output Vector, Input Vector and tructural Vector respectively. R, R, RR, RD, RM and RC are Routing Vectors. The definition and role of each Tense Control Vector is explained below. The ignification Vector is defined for every noun. The j and i respectively represent output and input attribute of a noun. The role of L(i) is to duplicate Programs of the F are shown as Lyee cenario Function sample programs at information from an input memory area to its own memory area. The role of L(j) is to create information to be stored in its own memory area by complementary action. The role of L(j) is to store in its memory area an execute directive of ignification Vector L(j). The O(r) is defined for every output memory area, r. The role is to output data in the output memory area to an output physical unit. The output attribute noun, j, is a noun belonging to the output memory area. The I(r) is defined for every input memory area, r. The role is to obtain data from an input physical unit into its input memory area. The input attribute noun, i, is a noun belonging to the input memory area. The (a) is defined for every memory area, a, requiring initialization. The role is to initialize the area. R, R, RR, RD, RM and RC specify Pallet Function that is executed next. The Tense Control Vectors are bundled by the three kinds of Pallet Functions, Φ, Φ and Φ, as follows: Φ({L(j)}+{O(r)}+{(a)}+R), Φ({L(i)}+{I(r)} +R), and Φ({L(j)}+{RR, RD, RM, RC}. The symbol {} is a set symbol to bundle Tense Control Vectors, and the + is a symbol to indicate the execution order. For example, Tense Control Vectors bundled in a Pallet Function, Φ, are placed in the order of L(j), O(r), (a) and R, and they operate in this placement order. This is expressed by Φ({L(j)}+{O(r)} +{(a)}+r). In a set of kind-wise Tense Control Vectors, a symbol to indicate execution order is not contained. For example, the set L(j) means that the way of the placement of the ignification Vectors of L(j) is free, and it operates in the free-placement order upon execution. A set of Tense Control Vectors bundled by the Pallet Function is generally called Pallet. The Pallets to be bundled by Φ, Φ and Φ are respectively expressed as W0, W0 and W0. The Tense Control Function, Φ, assigns executionright to the next-to-operate Pallet Function. A Pallet Function having been given the execution-right gives the execution-right to all Tense Control Vectors belonging to the self. Once Tense Control Vectors are thoroughly executed, the execution-right is returned to the Pallet Function. The Pallet Function judges whether its Pallet needs to be re-executed or not. If the re-execution must be repeated, the execution-right is again given to all Tense Control Vectors belonging to the self. If otherwise, the execution-right is returned to the Tense Control Function. Thereafter, the Pallet Functions make execution in the order of Φ, Φ, Φ, under the Tense Control Function. It is defined in the format of Φ(Φ+Φ+Φ). This is an expression of the F definition. The execution of F and the Tense Control Vectors are described the sections and.

3 . Predicate structure If an element of the denotational world that corresponds to an element of the connotational world exists, the element is made exteriorized because it can actualize as a real existence with view to the hypothesis. However, if it has already been actualized, it is not necessary to actualize in repetition. Also, if there is no corresponding element in the connotational world, an element of the denotational world cannot be actualized. The actualization means to make the self actualize by utilizing other element that has already been made into a real existence. This is a complementary action. However, the complementary action must be what reflects an intention. It is implemented in accordance with the providence of actualization. This means a state in which the mutual relation concerned with the complementary action establishes ynchronous tructure. Through this, the actualization is recognized. If otherwise, the complementary action must be done over again, or, stop doing it. All mentioned above is represented as the predicate structure shown in Fig.. The predicate structure consists of seven boxes and each box contains a specific rule. The definition of all operators that are shown in the definition of F is effected by the determination of the seven kinds of rules of the predicate structure. The st rule is contained in the first box, and so on. ach of the nd, th, th and th boxes has a memory area where the result of execution of the rule is to be stored. Those memory areas are called the nd, th, th and th areas respectively. The predicate structure becomes a ignification Vector when a noun is given to it as its variable, whereas the predicate structure becomes an Action Vector when it takes a plural number of nouns as its variable and performs a specific role. Figure. Predicate structure The six kinds of rules except the nd rule are autonomously determined based on the definition information of the nd rule, so the definition action is a work for the nd rule only practically. The nd rule is already fixed by what must be regulated by each operator, so F can be defined simply by implementing the regulated work. This work is already done with a tool. Associated work elements required to execute F on computer, for example, logical and physical definitions of a screen must be fulfilled separately from the above work as a natural course of procedure. A ignification Vector is a proposition because it is defined by taking one piece of noun as its variable, and an Action Vector is a function which is defined as a functionality that takes plural nouns as variable. The ignification Vector is true as a proposition if a value is being set in its th area. The complementary action of ignification Vectors materializes as a relation of propositions that become true. The Input Vector materializes as a function if information can be obtained in its th area from an input physical unit. The Output Vector materializes as a function if a flag indicating success of an output action is set into its th area. The Routing Vector materializes as a function if the next-to-execute Pallet is appointed in its th area.. ynchronous structure In this study, a relation to establish an intention and a requirement of its reflection concurrently is called ynchronous tructure. That is, it is a world of TDM and F. The synchronous range means the range of an intention to materialize as well as the range of a requirement of its reflection. A plural number of Fs can be connected each other. In liaison with one another upon execution, plural Fs realize expansion or reduction of the synchronous range. ame as F can be defined statically, a state providing the liaison can also be defined statically by using Fs as elements. The diagram to show the liaison of Fs is called Process Route Diagram, hereinafter denoted as PRD. F can be defined as a set of nouns which are unitized as a requirement, for example, by taking one screen and a set of nouns belonging thereto as a unit. Therefore, a F can be defined in correspondence to each of the screens in the screen transition. By taking Fs as elements and based on the relation of the screen transition, PRD can be defined. Owing to the F s structural features, PRD can be drawn through mechanical procedure if only the information of individual screens can be defined. Therefore, if this procedure is mechanized by a tool, a work to define the screen transition information can be substituted by the tool. A rule of liaison of plural pieces of F is four kinds. It is reflected as a definition of Routing Vectors, RR, RD, RM and RC, belonging to W0.

4 . xecution of F Once a Pallet s Tense Control Vectors are executed thoroughly, the status of the Pallet is recorded. Recorded is a status of just before and current. The status of a Pallet means a set of status of the th area (true/false as a proposition), the th area (refusal flag) and the th area (restart flag) of all the Tense Control Vectors belonging to the Pallet. These areas are generally called Pallet Area in particular. Routing Vectors belonging to W0 and W0, i.e. R and R, compare the just-before and current status of the self Pallet, and if there is a state transition, the execution of the self is terminated. If there is no state transition, the Pallet to be executed is appointed in the self s th area. R appoints W0 of the same F, R appoints W0 of the same F. Pallet Functions of W0 and W0, i.e. Φ and Φ, implement check on the th area of R and R belonging to the self Pallet, once all Tense Control Vectors belonging to the self Pallet are executed thoroughly. Then, if the next-to-execute Pallet has been appointed thereabouts, the Pallet Function transfers executionright to the Tense Control Function, Φ. Based on the information, the Tense Control Function transfers execution-right to the next-to-execute Pallet Function. If the next-to-execute Pallet has not been appointed thereabouts, the Pallet Function gives execution-right to the Tense Control Vectors belonging to the self and reexecutes from the beginning. There are four kinds of Pallets to be appointed as the next-to-execute Pallet by the Routing Vector belonging to W0. For this reason, four kinds of Routing Vectors, RR, RD, RM and RC, are defined on W0. Details of Routing Vectors are described later. The status of Pallets symbolizing the appearance of the F execution is a result of executing ignification Vectors. It is a result of the complementary action to materialize among ignification Vectors to be executed. Therefore, the presence of the state transition of Pallet Areas is a condition to determine whether F is to be executed or not. That is, if a state transition occurs, it indicates that there is still a possibility of materializing complementary action in the F, and if no state transition, it indicates that a complementary action does not materialize. Based on the data which is obtained with the Input Vector, F establishes the complementary action autonomously among W0 ignification Vectors. Then the Output Vector determines the state of the result of the complementary action so as to establish another complementary action with us. That is, the Output Vector performs a role to manifest (output) a result of the complementary action established by F. It is synonymous with the materialization of a new intention in our mind. In other words, all the possible requirements of N N materialize by the F s complementary action, and an intention materializes in us by the Output Vector s action. Then, an additional requirement materializes in us, reflecting its intention, thereby an additional complementary action being established in F. The structure to realize the above is the ynchronous tructure. The three-dimensional space of TDM represents our mind, whereas the threedimensional coordinates represents N N requirements. F and we share the N N requirements. In other words, the Input Vector commences to build the ynchronous tructure, and the Output Vector destroys it. Thus, the hypothesis is realized, which an intention materializes in us and then the N N requirement reflecting it materialize. The traditional program establishes logical action before executing on computer. In contrast, F establishes it upon execution through the complementary action that is implemented autonomously by utilizing the state transition of Pallets, which appears structurally. As a result of execution, F produces the same result as the traditional program, but it materializes a meaning fundamentally different from the meaning of movements of the traditional program.. tructure of tense control vector In this section, the rules of each box of the predicate structure as the ignification Vector and the Action Vector are described. The relation of memory areas of the ignification Vector and the Action Vector is shown in Fig.. i i RAD L(i) I(r) Figure. Relation of memory areas j j WRIT L(j) O(r)

5 .. ignification vector The ignification Vector executes the self by itself by obtaining the execution-right from the Pallet Function. Upon the end of execution, the executionright is returned to the Pallet Function. The ignification Vectors on W0, W0 and W0 have different roles as described below.... W0 signification vector, L(j). The st rule compares and checks the presence of the data in the th area of itself and a value in the th area of W0 ignification Vector of the same noun. If a self data exists in the th area of the W0 ignification Vector, the purpose of this ignification Vector was accomplished, so execution-right is returned to the Pallet Function. A set of the th areas of L(j) corresponds to the nd area of the Output Vector, O(r), which is the memory area for output. If there is no data in the th area of itself and if the data in the th area of W0 corresponds to the st rule of W0, the nd rule is executed. The nd rule is to operate an arithmetic calculation or duplicate the information existing in a specific memory area. This is the simplest requirement of users. In other words, the ignification Vectors can be defined by requirements on this level. The nd area of L(j) is a temporary memory area of this ignification Vector. The rd rule checks the presence of self data in the nd area of O(r). If there is data in that place, the validity of the data shall be guaranteed by its presence. The reason is that the self in the nd area of O(r) cannot materialize unless data of other nouns are present in the th areas of L(j) or L(i), which are elements to materialize the complementary action to produce the data in the nd area of the O(r). The th rule of L(j) duplicates this nd area data to its th area, which is the nd area of O(r), then the execution-right is returned to the Pallet Function. If there is no data in its nd area of L(j), the th rule checks the state transition of the Pallet, which is a set of status in the th areas on this Pallet. If there is a state transition, the th rule is executed. If there is no state transition, the th rule is executed. After either of the th rule or the th rule is executed, the execution-right is returned to the Pallet Function. The th rule sets a refusal flag which refuses re-execution of the ignification Vector into the its th area. It causes the issuance of a message if necessary. The th rule sets a recursion flag into its th area, which requests reexecution of the complementary action. The usage of this flag is not fixed in particular.... W0 signification vector, L(i). The st rule checks the presence of data in its th area. If there is data, the purpose of this L(i) has already accomplished, the execution-right is returned to the Pallet Function. If there is no data, the nd rule is executed. The nd rule sets data into its nd area after obtaining it from the input memory area, which is the nd area of the Input Vector. The nd area is a temporary memory area of this ignification Vector. The rd rule checks the presence of data in its nd area. If there is data, the th rule duplicates the data in the nd area into its th area, and the execution-right is returned to the Pallet Function. The th area of L(i) is used by the complementary action of L(j) and the nd rule of the W0 ignification Vector. If there is no data, the th rule is executed. The th rule, the th rule and the th rule perform in the same way as those of the W0 ignification Vector.... W0 signification vector, L(j). The st rule checks the presence of data in the th area of this L(j), and it makes judgment on the necessity of executing itself. If there is data in the th area, the purpose of this ignification Vector has already accomplished, the execution-right is returned to the Pallet Function. If there is no data in that place, its nd rule is executed. The nd rule is to specify necessary condition of the materialization of L(j) of the same noun. The requirement to determine this nd rule of F requires logicality most strongly if the program is developed in the traditional ways. That is, this is the part requiring high-level work knowledge and a corresponding logical design. F has its features at the point of simplifying this problem. That is, this logicality is resolved into the relation of data that establishes the way of mutual relation of plural nouns and their connection. In the traditional world, this must be replaced by a problem of establishing the whole by means of combining both of the sequential order that establishes parts of requirement and the sequential order of those parts. In the scheme of F, each noun is replaced ignification Vectors belonging to W0 and W0, and data are determined for every noun through the complementary action which is implemented autonomously thereabouts. The complementary action is an action to manage the role for this sequential order. The meaning of its autonomous materialization is that the work to determine the sequential order can be removed from human work. The logical condition upon execution is built up resultantly by data for the respective nouns. Therefore, it is clear that this relation defined by the nd rule of L(j) can be handled by the definition of a noun that affects the noun to become a variable. From the relation defined by the nd rules of L(j) and L(i), a directory of nouns can be obtained. From the directory, nouns concerned with the nd rule of L(j) can be obtained. If users define the way of

6 connection of the nouns as a requirement, instructions defined by this nd rule can be conclusively simplified much more than those defined logically by the traditional approach. In this connection, automatic algorithm is established, which converts traditional programs into F. By using it, conversions from Assembler to COBOL and from COBOL to COBOL were implemented. The rd rule checks the validity of data in the nd area, which is a temporary memory area for this ignification Vector. It is enough if the presence of data in the nd area is checked. If there is data in the nd area, the validity of data is guaranteed because of it. If valid, the th rule duplicates the nd area data into its th area, and the execution-right is returned to the Pallet Function. The th rule, the th rule and the th rules are treated in the same way as those of L(j)... Action vectors The mode of giving and receiving of the executionright is the same as the ignification Vectors. The rule of each box of the four kinds of Action Vectors is explained below.... Input vector, I(r). The Input Vector can be defined if logical definitions of a set of nouns and DBM are determined. The input memory area is placed in the nd area of I(r). The st rule makes judgment if input data can be obtained into the nd area. That is, if the input memory area is in the initial state, and if a refusal flag of the {I(r)} is off, data can be obtained, so the nd rule is executed. If not so, the execution-right is returned to the Pallet Function. The nd rule executes an input command such as RAD. If this command is executed normally, it means that data has been obtained into the nd area. The rd rule makes judgment of the validity of the execution result of the input command. This means to examine the presence of data in the nd area, which is its input memory area. If there is data, it means that the execution of the input command has been implemented, the th rule sets a normal flag into the th area. After this, the executionright is returned to the Pallet Function. If there is no data, the th rule is executed. The th rule, the th rule and the th rule are treated in the same way as that of L(j).... Output vector, O(r). The Output Vector can be defined if logical definitions of a set of nouns and DBM are determined, same as the Input Vector. The output memory area is placed in the nd area. The st rule makes judgment if data in the nd area is to be output or not. That is, if a refusal flag of {L(j)} is off, data in the output memory area, which is a set of the th areas of L(j), can be output, so the nd rule is executed. If not so, the execution-right is returned to the Pallet Function. The nd rule executes an output command such as WRIT. If this command is executed normally, it means that data has been output into the nd area. The rd rule makes judgment of the validity of the execution result of the output command. This is defined in accordance with the rule of, for example, DBM. The th rule initializes its nd area and sets a normal flag in its th area if the result of executing the output command is valid. Then, the execution-right is returned to the Pallet Function. If the execution result is abnormal, the th rule is executed. The th rule, the th rule and the th rule are treated in the same way as that of L(j).... tructural vector, (a). The initialization of memory areas becomes indispensable so as to realize re-execution by the Pallet Function. The tructural Vector does area initialization required for it. However, the initialization of the W0 s output memory area is implemented by the Output Vector. A refusal flag and a recursion flag are not treated as an object of initialization. The initialization of these flags is implemented by the Pallet Function. The tructural Vector does initialization of other areas except above. If output success is declared by setting a normal flag in the th area of the Output Vector, it means that the output memory area has been initialized. Following the initialization of the th area of O(r), memory areas of W0 and W0 are initialized. Then, the Input Vector can start to operate.... Routing vectors, R, R, RR, RD, RM and RC. The Routing Vector specifies the next-to-execute Pallet in its th area. Which Pallet to specify is defined by the nd rule of the Routing Vector by using the state transition of the th area of {L(j)} and a refusal flag of {L(j)}. There are six kinds of Routing Vectors and each of which is explained below. R is the Routing Vector of the W0 Pallet. The st rule of R checks the state transition of the W0 to which the R belongs. If there is no state transition, the R s th rule appoints W0 of the same F into the R s th area as a Pallet to be executed next, and the execution-right is returned to the Pallet Function. If there is any state transition, and the execution-right is returned to the Pallet Function. If the next-to-execute Pallet is appointed, the execution-right is returned to the Tense Control Function from the Pallet Function. If the next-to-execute Pallet is not appointed, the executionright is transferred to all Tense Control Vectors belonging to the Pallet Function, and the Tense Control Vectors implement re-execution. If the re-execution of Tense Control Vectors continues, the W0 s state

7 transition will disappear. The transfer of the executionright from W0 to W0 is a role of the Tense Control Function. Vesting the execution-right in the Tense Control Vectors is a role of the Pallet Function, whereas returning the execution-right to the Pallet Function is a role of Tense Control Vectors. Vesting the executionright in the Pallet Functions is a role of the Tense Control Function, whereas returning the execution-right to the Tense Control Function is a role of the Pallet Functions. R is the Routing Vector of the W0 Pallet. The st rule of R checks the state transition of the W0 to which the R belongs. If there is no state transition, the R s th rule appoints W0 of the same F into the R s th area as a Pallet to be executed next, and the execution-right is returned to the Pallet Function. If there is any state transition, nothing is executed, and the execution-right is returned to the Pallet Function. RR, RD, RM and RC are the Routing Vectors of W0. The st rule of RR checks the state transition of the W0 to which the RR belongs. If there is any state transition, W0 of the same F is appointed into the RR s th area as the next-to-execute Pallet. If there is no state transition, and the execution-right is returned to the Pallet Function. The st rule of RD checks the state transition of the W0 to which the RD belongs. If there is no state transition, W0 of the F that is located just before this operating F on PRD is appointed into the RD s th area as the Pallet to be executed next. If there is no state transition, the execution-right is returned to the Pallet Function. While there is state transition in W0, RR handles the situation. When termination of the operation of F is not declared, the st rule of RC checks the state transition of the W0 to which the RC belongs. If there is no state transition, W0 of the succeeding F on PRD is appointed into the RC s th area as the Pallet to be executed next. If there is state transition, nothing is executed and the execution-right is returned to the Pallet Function. While there is state transition in W0, RR handles the situation. When termination of the operation of F is declared and if F to be executed next is specified on PRD, RC appoints W0 of the next-to-execute F into the RC s th area. Thus, RC are defined separately for the cases that termination of the operation of F is declared and not declared. If termination of the operation of F is declared, RM appoints into its own th area the W0 of the preceding F to return as the Pallet to be executed next. This preceding F is located two or more Fs before this operating F and is specified as the F to be executed next on PRD. 8. Nature of noun Meaning and functionality that cannot be realized with nouns extracted mechanically or with the complementary action can be realized by extending the concept of the noun. The extended concept of the nouns are called Boundary Noun, quivalent Noun and ummation Noun. Propositions are made for each of these nouns. 8.. Boundary noun When three Fs, which are denoted as F, F and F respectively, make a row connected with RD on PRD, F and F can be treated as one F, and F and F can also be treated as one F. However, it is uncertain that F and F possess a relation to materialize the ynchronous tructure. Therefore, if the th area of the ignification Vector of a certain noun of W0 of F is used for the complementary action of the ignification Vector of W0 of F, there is a case in which the ynchronous tructure of F does not materialize. In order to avoid this concern, the th area of the noun of the W0 ignification Vector of F is duplicated and placed also in the W0 area of F. When the th area of a noun on W0 is justified, its ignification Vector sets the result not only into its th area but also into the th area of the same noun duplicated in the F. uch word is called Boundary Noun. Whether a Boundary Noun is required or not is determined by the nd rule of the ignification Vector of W0 of F. 8.. quivalent noun The purpose of W0 ignification Vector is to determine output data. The way of the generation of the data happens to become plural depending upon the condition specified by W0 ignification Vector. In this instance, one W0 ignification Vector for the noun is defined, whereas W0 ignification Vectors for the same noun for each way of the data generation should be defined separately. The noun having plural W0 ignification Vectors is called quivalent Noun. 8.. ummation noun There are nouns to be used for arithmetic summation. An auxiliary memory area for the exclusive use for summing up is added in the nd area of the W0 ignification Vectors of those nouns.

8 9. Database In the conventional ways of software development, the definition of data items of database is implemented logically, so there is a fundamental problem that logical adjustment between the database and the programs cannot be easily done. F is comprosed of ignification Vectors. ignification Vectors are determined for each noun. ignification Vectors are independent to each other. This gives universality to the logical relation between database and programs. Consequently, design work of database becomes easy. Proceedings of the ACI nd International Conference on oftware ngineering, Artificial Intelligence, Networking & Parallel/Distributed Computing (NPD 0). August 00. Nagoya, Japan. 0. Conclusion The purpose of this paper is to present a summary of the scheme of TDM and the structure of F to give a comprehensive view of the theory, and the some detailed information necessary for actual implementation is omitted for his purpose. The detailed information is shown at our web site. F is created based on a non-engineering hypothesis. However, in the actual software development, high productivity and maintainability are witnessed. This is the first case that non-engineering hypothesis solves issues arising in the world of software engineering. The program structure of F is completely different from that of conventional programs, which is an inevitable conclusion. The concept that the F s structure shows is new and different from the engineering concept of software. For example, the pre-execution and proexecution states are the same in the conventional program structure, whereas F is different. The difference brings advantages to software developers. If the environments to determine F, such as tools, O and programming languages, are developed, the level of world of software would surpass the present one. The hypothesis presented here is deeply influenced with the works of pinoza, Leibniz and Wittgenstein but not based on engineering. This is why the author uses the term non-engineering. This study is based on theory established in the Consciousness Model, and the theory will be presented at another opportunity. RFRNC. F. Negoro, Principle of Lyee oftware, in Proc. I000, Aizu, Japan, Nov. 000, pp. -.. F. Negoro, A Proposal for Requirement ngineering, to be included in Proc. ADBI 00, Vilnius, Lithuania, ep F. Negoro, Intent Operationaliasation for ource Code Generation, to be included in the Proc. CI00, Orlando, UA, Jul

Configuration management for Lyee software

Configuration management for Lyee software Knowledge-Based Systems 16 (2003) 441 447 www.elsevier.com/locate/knosys Configuration management for Lyee software V. Gruhn*, R. Ijioui, D. Peters, C. Schäfer Faculty of Mathematics and Computer Science,

More information

Analyzing and Segmenting Finger Gestures in Meaningful Phases

Analyzing and Segmenting Finger Gestures in Meaningful Phases 2014 11th International Conference on Computer Graphics, Imaging and Visualization Analyzing and Segmenting Finger Gestures in Meaningful Phases Christos Mousas Paul Newbury Dept. of Informatics University

More information

A MULTI-DIMENSIONAL DATA ORGANIZATION THAT ASSISTS IN THE PARSING AND PRODUCTION OF A SENTENCE

A MULTI-DIMENSIONAL DATA ORGANIZATION THAT ASSISTS IN THE PARSING AND PRODUCTION OF A SENTENCE A MULTI-DIMENSIONAL DATA ORGANIZATION THAT ASSISTS IN THE PARSING AND PRODUCTION OF A SENTENCE W. Faris and K. Cheng Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

A Tutorial on Agent Based Software Engineering

A Tutorial on Agent Based Software Engineering A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on Agent Based Software Engineering Qun Zhou December, 2002 Abstract Agent oriented software

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

A Fundamental Study for Creating 3D CG Animation of an Assembly Work

A Fundamental Study for Creating 3D CG Animation of an Assembly Work Industrial Engineering & Management Systems Vol 11, No 2, June 2012, pp.188-195 ISSN 1598-7248 EISSN 2234-6473 http://dx.doi.org/10.7232/iems.2012.11.2.188 2012 KIIE A Fundamental Study for Creating 3D

More information

Information technology Security techniques Guidance on the integrated implementation of ISO/IEC and ISO/IEC

Information technology Security techniques Guidance on the integrated implementation of ISO/IEC and ISO/IEC Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27013 Second edition 2015-12-01 Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27013 First edition 2012-10-15 Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 Technologies de l'information

More information

Typed Lambda Calculus

Typed Lambda Calculus Department of Linguistics Ohio State University Sept. 8, 2016 The Two Sides of A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a system of notation for functions

More information

On-Line Error Detecting Constant Delay Adder

On-Line Error Detecting Constant Delay Adder On-Line Error Detecting Constant Delay Adder Whitney J. Townsend and Jacob A. Abraham Computer Engineering Research Center The University of Texas at Austin whitney and jaa @cerc.utexas.edu Parag K. Lala

More information

UNIT 1-2 MARKS QUESTIONS WITH ANSWERS

UNIT 1-2 MARKS QUESTIONS WITH ANSWERS SUBJECT: SOFTWARE TESTING METHODOLOGIES. UNIT 1-2 MARKS QUESTIONS WITH ANSWERS 1) What is testing? What is the purpose of testing? A) TESTING: After the programs have been developed they must be tested

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

THE FOUNDATIONS OF MATHEMATICS

THE FOUNDATIONS OF MATHEMATICS THE FOUNDATIONS OF MATHEMATICS By: Sterling McKay APRIL 21, 2014 LONE STAR - MONTGOMERY Mentor: William R. Brown, MBA Mckay 1 In mathematics, truth is arguably the most essential of its components. Suppose

More information

Typed Lambda Calculus for Syntacticians

Typed Lambda Calculus for Syntacticians Department of Linguistics Ohio State University January 12, 2012 The Two Sides of Typed Lambda Calculus A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a

More information

normalization are being violated o Apply the rule of Third Normal Form to resolve a violation in the model

normalization are being violated o Apply the rule of Third Normal Form to resolve a violation in the model Database Design Section1 - Introduction 1-1 Introduction to the Oracle Academy o Give examples of jobs, salaries, and opportunities that are possible by participating in the Academy. o Explain how your

More information

An Efficient Staging Algorithm for Binding-Time Analysis

An Efficient Staging Algorithm for Binding-Time Analysis An Efficient Staging Algorithm for Binding-Time Analysis Takuma Murakami 1, Zhenjiang Hu 1,2, Kazuhiko Kakehi 1, and Masato Takeichi 1 1 Department of Mathematical Informatics, Graduate School of Information

More information

Extending real-time collaborative editing systems with asynchronous communication

Extending real-time collaborative editing systems with asynchronous communication Extending real-time collaborative editing systems with asynchronous communication Claudia-Lavinia Ignat and Moira C. Norrie Institute for Information Systems, ETH Zurich {ignat,norrie}@inf.ethz.ch Abstract

More information

Self-checking combination and sequential networks design

Self-checking combination and sequential networks design Self-checking combination and sequential networks design Tatjana Nikolić Faculty of Electronic Engineering Nis, Serbia Outline Introduction Reliable systems Concurrent error detection Self-checking logic

More information

Test Cases Generation from UML Activity Diagrams

Test Cases Generation from UML Activity Diagrams Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Test Cases Generation from UML Activity Diagrams Hyungchoul Kim, Sungwon

More information

Chapter 5. Repetition. Contents. Introduction. Three Types of Program Control. Two Types of Repetition. Three Syntax Structures for Looping in C++

Chapter 5. Repetition. Contents. Introduction. Three Types of Program Control. Two Types of Repetition. Three Syntax Structures for Looping in C++ Repetition Contents 1 Repetition 1.1 Introduction 1.2 Three Types of Program Control Chapter 5 Introduction 1.3 Two Types of Repetition 1.4 Three Structures for Looping in C++ 1.5 The while Control Structure

More information

Operational Semantics

Operational Semantics 15-819K: Logic Programming Lecture 4 Operational Semantics Frank Pfenning September 7, 2006 In this lecture we begin in the quest to formally capture the operational semantics in order to prove properties

More information

The Logical Design of the Tokeniser

The Logical Design of the Tokeniser Page 1 of 21 The Logical Design of the Tokeniser Purpose 1. To split up a character string holding a RAQUEL statement expressed in linear text, into a sequence of character strings (called word tokens),

More information

Choosers: designing a highly expressive algorithmic music composition system for non-programmers

Choosers: designing a highly expressive algorithmic music composition system for non-programmers Choosers: designing a highly expressive algorithmic music composition system for non-programmers Matt Bellingham 1, Simon Holland 2 and Paul Mulholland 2 1 University of Wolverhampton 2 The Open University

More information

One of the most important areas where quantifier logic is used is formal specification of computer programs.

One of the most important areas where quantifier logic is used is formal specification of computer programs. Section 5.2 Formal specification of computer programs One of the most important areas where quantifier logic is used is formal specification of computer programs. Specification takes place on several levels

More information

Instructor: Craig Duckett. Lecture 11: Thursday, May 3 th, Set Operations, Subqueries, Views

Instructor: Craig Duckett. Lecture 11: Thursday, May 3 th, Set Operations, Subqueries, Views Instructor: Craig Duckett Lecture 11: Thursday, May 3 th, 2018 Set Operations, Subqueries, Views 1 MID-TERM EXAM GRADED! Assignment 2 is due LECTURE 12, NEXT Tuesday, May 8 th in StudentTracker by MIDNIGHT

More information

Cooperation with other Certification Systems

Cooperation with other Certification Systems ISCC 254 Cooperation with other Certification Systems Cooperation with other Certification Systems ISCC 11-01-14 V 1.16 11-01-14 Copyright notice ISCC 2010 This ISCC document is protected by copyright.

More information

Fundamentals of the J Programming Language

Fundamentals of the J Programming Language 2 Fundamentals of the J Programming Language In this chapter, we present the basic concepts of J. We introduce some of J s built-in functions and show how they can be applied to data objects. The pricinpals

More information

Available online at ScienceDirect. Procedia Computer Science 60 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 60 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 60 (2015 ) 1014 1020 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM

1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1. NUMBER SYSTEMS USED IN COMPUTING: THE BINARY NUMBER SYSTEM 1.1 Introduction Given that digital logic and memory devices are based on two electrical states (on and off), it is natural to use a number

More information

UNIT III & IV. Bottom up parsing

UNIT III & IV. Bottom up parsing UNIT III & IV Bottom up parsing 5.0 Introduction Given a grammar and a sentence belonging to that grammar, if we have to show that the given sentence belongs to the given grammar, there are two methods.

More information

A Context-sensitive Access Control Model and Prototype Implementation

A Context-sensitive Access Control Model and Prototype Implementation A Context-sensitive Access Control Model and Prototype Implementation Damian G. Cholewka 1, Reinhardt A. Botha 2, Jan H.P. Eloff 1 1 Rand Afrikaans University, Johannesburg, South Africa 2 Port Elizabeth

More information

CPW Method Version 1.0 March 18, 2009

CPW Method Version 1.0 March 18, 2009 CPW Method Version 1.0 March 18, 2009 Copyright 2009, Bernd J. chneider All Rights Reserved Abstract The CPW (Cognitive Process Workflow) Method is a process method, a process modeling method and a workflow

More information

Like scalar processor Processes individual data items Item may be single integer or floating point number. - 1 of 15 - Superscalar Architectures

Like scalar processor Processes individual data items Item may be single integer or floating point number. - 1 of 15 - Superscalar Architectures Superscalar Architectures Have looked at examined basic architecture concepts Starting with simple machines Introduced concepts underlying RISC machines From characteristics of RISC instructions Found

More information

EE6301 DIGITAL LOGIC CIRCUITS UNIT IV ASYNCHRONOUS SEQUENTIAL CIRCUITSAND PROGRAMMABLE LOGIC DEVICES PART A

EE6301 DIGITAL LOGIC CIRCUITS UNIT IV ASYNCHRONOUS SEQUENTIAL CIRCUITSAND PROGRAMMABLE LOGIC DEVICES PART A EE6301 DIGITAL LOGIC CIRCUITS UNIT IV ASYNCHRONOUS SEQUENTIAL CIRCUITSAND PROGRAMMABLE LOGIC DEVICES PART A 1. What is deadlock condition? [N/D 14] A condition resulting when one task is waiting to access

More information

Dynamics modeling of structure-varying kinematic chains for free-flying robots

Dynamics modeling of structure-varying kinematic chains for free-flying robots Dynamics modeling of structure-varying kinematic chains for free-flying robots Roberto Lampariello, Satoko Abiko, Gerd Hirzinger Institute of Robotics and Mechatronics German Aerospace Center (DLR) 8 Weßling,

More information

Performance impact of dynamic parallelism on different clustering algorithms

Performance impact of dynamic parallelism on different clustering algorithms Performance impact of dynamic parallelism on different clustering algorithms Jeffrey DiMarco and Michela Taufer Computer and Information Sciences, University of Delaware E-mail: jdimarco@udel.edu, taufer@udel.edu

More information

CS4411 Intro. to Operating Systems Exam 1 Fall points 10 pages

CS4411 Intro. to Operating Systems Exam 1 Fall points 10 pages CS4411 Intro. to Operating Systems Exam 1 Fall 2005 (October 6, 2005) 1 CS4411 Intro. to Operating Systems Exam 1 Fall 2005 150 points 10 pages Name: Most of the following questions only require very short

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 20 Concurrency Control Part -1 Foundations for concurrency

More information

Conceptual Modeling of Dynamic Interactive Systems Using the Equivalent Transformation Framework

Conceptual Modeling of Dynamic Interactive Systems Using the Equivalent Transformation Framework 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 253 Conceptual Modeling of Dynamic Interactive Systems Using the Equivalent Transformation Framework

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

A Vector Space Equalization Scheme for a Concept-based Collaborative Information Retrieval System

A Vector Space Equalization Scheme for a Concept-based Collaborative Information Retrieval System A Vector Space Equalization Scheme for a Concept-based Collaborative Information Retrieval System Takashi Yukawa Nagaoka University of Technology 1603-1 Kamitomioka-cho, Nagaoka-shi Niigata, 940-2188 JAPAN

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Curriculum Map Grade(s): Subject: AP Computer Science

Curriculum Map Grade(s): Subject: AP Computer Science Curriculum Map Grade(s): 11-12 Subject: AP Computer Science (Semester 1 - Weeks 1-18) Unit / Weeks Content Skills Assessments Standards Lesson 1 - Background Chapter 1 of Textbook (Weeks 1-3) - 1.1 History

More information

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on

More information

Chapter 2: Relational Model

Chapter 2: Relational Model Chapter 2: Relational Model Database System Concepts, 5 th Ed. See www.db-book.com for conditions on re-use Chapter 2: Relational Model Structure of Relational Databases Fundamental Relational-Algebra-Operations

More information

Have examined process Creating program Have developed program Written in C Source code

Have examined process Creating program Have developed program Written in C Source code Preprocessing, Compiling, Assembling, and Linking Introduction In this lesson will examine Architecture of C program Introduce C preprocessor and preprocessor directives How to use preprocessor s directives

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

3D Digitization of a Hand-held Object with a Wearable Vision Sensor

3D Digitization of a Hand-held Object with a Wearable Vision Sensor 3D Digitization of a Hand-held Object with a Wearable Vision Sensor Sotaro TSUKIZAWA, Kazuhiko SUMI, and Takashi MATSUYAMA tsucky@vision.kuee.kyoto-u.ac.jp sumi@vision.kuee.kyoto-u.ac.jp tm@i.kyoto-u.ac.jp

More information

Incorporating Satellite Documents into Co-citation Networks for Scientific Paper Searches

Incorporating Satellite Documents into Co-citation Networks for Scientific Paper Searches Incorporating Satellite Documents into Co-citation Networks for Scientific Paper Searches Masaki Eto Gakushuin Women s College Tokyo, Japan masaki.eto@gakushuin.ac.jp Abstract. To improve the search performance

More information

Contents. Chapter 3 Combinational Circuits Page 1 of 34

Contents. Chapter 3 Combinational Circuits Page 1 of 34 Chapter 3 Combinational Circuits Page of 34 Contents Contents... 3 Combinational Circuits... 2 3. Analysis of Combinational Circuits... 2 3.. Using a Truth Table... 2 3..2 Using a Boolean unction... 4

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6302- DATABASE MANAGEMENT SYSTEMS Anna University 2 & 16 Mark Questions & Answers Year / Semester: II / III

More information

Interaction Testing! Chapter 15!!

Interaction Testing! Chapter 15!! Interaction Testing Chapter 15 Interaction faults and failures Subtle Difficult to detect with testing Usually seen after systems have been delivered In low probability threads Occur after a long time

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

the application rule M : x:a: B N : A M N : (x:a: B) N and the reduction rule (x: A: B) N! Bfx := Ng. Their algorithm is not fully satisfactory in the

the application rule M : x:a: B N : A M N : (x:a: B) N and the reduction rule (x: A: B) N! Bfx := Ng. Their algorithm is not fully satisfactory in the The Semi-Full Closure of Pure Type Systems? Gilles Barthe Institutionen for Datavetenskap, Chalmers Tekniska Hogskola, Goteborg, Sweden Departamento de Informatica, Universidade do Minho, Braga, Portugal

More information

Student Performance Analysis Report. Subtest / Content Strand. Verbal Reasoning 40 Questions Results by Question # of Q

Student Performance Analysis Report. Subtest / Content Strand. Verbal Reasoning 40 Questions Results by Question # of Q Student: BLAIR, SIERRA Test Date: 9/2018 (Fall) Grade: 7 Level: 6 Page: 1 Verbal Reasoning 40 Questions Results by Question # of Q Analogical Reasoning (Results presented in order of question difficulty)

More information

UNIT-II. Part-2: CENTRAL PROCESSING UNIT

UNIT-II. Part-2: CENTRAL PROCESSING UNIT Page1 UNIT-II Part-2: CENTRAL PROCESSING UNIT Stack Organization Instruction Formats Addressing Modes Data Transfer And Manipulation Program Control Reduced Instruction Set Computer (RISC) Introduction:

More information

Unit 1: Understanding Production Systems

Unit 1: Understanding Production Systems Unit 1: Understanding Production Systems Section 1.1: The ACT-R Production System ACT-R is a production system theory that tries to explain human cognition by developing a model of the knowledge structures

More information

Induction Schemes. Math Foundations of Computer Science

Induction Schemes. Math Foundations of Computer Science Induction Schemes Math Foundations of Computer Science Topics Induction Example Induction scheme over the naturals Termination Reduction to equational reasoning ACL2 proof General Induction Schemes Induction

More information

Revision of Inconsistent Orthographic Views

Revision of Inconsistent Orthographic Views Journal for Geometry and Graphics Volume 2 (1998), No. 1, 45 53 Revision of Inconsistent Orthographic Views Takashi Watanabe School of Informatics and Sciences, Nagoya University, Nagoya 464-8601, Japan

More information

White Paper Workflow Patterns and BPMN

White Paper Workflow Patterns and BPMN White Paper Workflow Patterns and BPMN WP0121 December 2013 In general, a pattern describes a solution for a recurring problem. Patterns are commonly used in architecture as a formal way of documenting

More information

Relational Algebra. Procedural language Six basic operators

Relational Algebra. Procedural language Six basic operators Relational algebra Relational Algebra Procedural language Six basic operators select: σ project: union: set difference: Cartesian product: x rename: ρ The operators take one or two relations as inputs

More information

arxiv: v1 [cs.se] 17 Aug 2016

arxiv: v1 [cs.se] 17 Aug 2016 Introduction to the Case Management Model and Notation (CMMN) arxiv:1608.05011v1 [cs.se] 17 Aug 2016 Mike A. Marin University of South Africa IBM Analytics Group mmarin@acm.org August 18, 2016 Abstract

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE. List of documents of the DG EAC to be registered

EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE. List of documents of the DG EAC to be registered EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE Resources Logistics and document management Ref. Ares(2013)2760789-26/07/2013 Ref. Ares(2016)5750696-04/10/2016 Brussels, EAC.R.5/APa,

More information

Crises Management in Multiagent Workflow Systems

Crises Management in Multiagent Workflow Systems Crises Management in Multiagent Workflow Systems Małgorzata Żabińska Department of Computer Science, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Kraków, Poland zabinska@agh.edu.pl

More information

Announcement. Exercise #2 will be out today. Due date is next Monday

Announcement. Exercise #2 will be out today. Due date is next Monday Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch

More information

Processing Interaction Protocols in Parallel: a Logic Programming implementation for Robotic Soccer

Processing Interaction Protocols in Parallel: a Logic Programming implementation for Robotic Soccer Processing Interaction Protocols in Parallel: a Logic Programming implementation for Robotic Soccer Mariano Tucat 1 Alejandro J. García 2 Artificial Intelligence Research and Development Laboratory Department

More information

Decision Making. final results. Input. Update Utility

Decision Making. final results. Input. Update Utility Active Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition Department of Computer Science and Engineering State University of New York

More information

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS Vijayalakshmi Atluri 1, Elisa Bertino 2, Elena Ferrari 3 Pietro Mazzoleni 2 1 MSIS Department CIMIC, Rutgers University, atluri@cimic.rutgers.edu

More information

Deadlock: Part II. Reading Assignment. Deadlock: A Closer Look. Types of Deadlock

Deadlock: Part II. Reading Assignment. Deadlock: A Closer Look. Types of Deadlock Reading Assignment T. M. Pinkston, Deadlock Characterization and Resolution in Interconnection Networks, Chapter 13 in Deadlock Resolution in Computer Integrated Systems, CRC Press 2004 Deadlock: Part

More information

DECISION-TREE-BASED MULTICLASS SUPPORT VECTOR MACHINES. Fumitake Takahashi, Shigeo Abe

DECISION-TREE-BASED MULTICLASS SUPPORT VECTOR MACHINES. Fumitake Takahashi, Shigeo Abe DECISION-TREE-BASED MULTICLASS SUPPORT VECTOR MACHINES Fumitake Takahashi, Shigeo Abe Graduate School of Science and Technology, Kobe University, Kobe, Japan (E-mail: abe@eedept.kobe-u.ac.jp) ABSTRACT

More information

Inference rule for Induction

Inference rule for Induction Inference rule for Induction Let P( ) be a predicate with domain the positive integers BASE CASE INDUCTIVE STEP INDUCTIVE Step: Usually a direct proof Assume P(x) for arbitrary x (Inductive Hypothesis),

More information

We use L i to stand for LL L (i times). It is logical to define L 0 to be { }. The union of languages L and M is given by

We use L i to stand for LL L (i times). It is logical to define L 0 to be { }. The union of languages L and M is given by The term languages to mean any set of string formed from some specific alphaet. The notation of concatenation can also e applied to languages. If L and M are languages, then L.M is the language consisting

More information

Transactions on Information and Communications Technologies vol 20, 1998 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 20, 1998 WIT Press,  ISSN APPLYING SQL TECHNIQUES ON INFERENCE MECHANISMS OF EXPERT SYSTEMS George DOBRE, Cosmin GRIGORESCU, Dorin CARSTOIU, Simona GRIGORESCU Department of Machine Elements and Tribology and Department of Computers

More information

CNC Milling Machines Advanced Cutting Strategies for Forging Die Manufacturing

CNC Milling Machines Advanced Cutting Strategies for Forging Die Manufacturing CNC Milling Machines Advanced Cutting Strategies for Forging Die Manufacturing Bansuwada Prashanth Reddy (AMS ) Department of Mechanical Engineering, Malla Reddy Engineering College-Autonomous, Maisammaguda,

More information

19 Much that I bound, I could not free; Much that I freed returned to me. Lee Wilson Dodd

19 Much that I bound, I could not free; Much that I freed returned to me. Lee Wilson Dodd 19 Much that I bound, I could not free; Much that I freed returned to me. Lee Wilson Dodd Will you walk a little faster? said a whiting to a snail, There s a porpoise close behind us, and he s treading

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Advance Encryption Standard (AES) Rijndael algorithm is symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256

More information

6. Dicretization methods 6.1 The purpose of discretization

6. Dicretization methods 6.1 The purpose of discretization 6. Dicretization methods 6.1 The purpose of discretization Often data are given in the form of continuous values. If their number is huge, model building for such data can be difficult. Moreover, many

More information

2003 LXI H, 42F2H ; this instruction store 42F2 in to the HL pair POP H ; store data from top of the stack to HL pair

2003 LXI H, 42F2H ; this instruction store 42F2 in to the HL pair POP H ; store data from top of the stack to HL pair (1) What is stack? Explain stack related instruction with example OR Give function of stack. OR What is stack? Explain the stack operations using examples. The stack is a group of memory location in the

More information

Analysis of Algorithms. Unit 4 - Analysis of well known Algorithms

Analysis of Algorithms. Unit 4 - Analysis of well known Algorithms Analysis of Algorithms Unit 4 - Analysis of well known Algorithms 1 Analysis of well known Algorithms Brute Force Algorithms Greedy Algorithms Divide and Conquer Algorithms Decrease and Conquer Algorithms

More information

PETRI NET ANALYSIS OF BATCH RECIPES

PETRI NET ANALYSIS OF BATCH RECIPES Presented at FOCAPO 98, Snowbird, USA. PETRI NET ANALYSIS OF BATCH RECIPES STRUCTURED WITH GRAFCHART Charlotta Johnsson and Karl-Erik Årzén Department of Automatic Control, Lund Institute of Technology,

More information

Representing Symbolic Reasoning

Representing Symbolic Reasoning Representing Symbolic Reasoning Brian Mastenbrook and Eric Berkowitz 1400 N. Roosevelt Blvd. Schaumburg, IL 60173 chandler@acm.roosevelt.edu eric@cs.roosevelt.edu Abstract Introspection is a fundamental

More information

STRUCTURE AND SYLLABUS APPROVED IN THE BOARD OF STUDIES MEETING ON 2001 TO BE EFFECTIVE FROM THE ACADEMIC YEAR

STRUCTURE AND SYLLABUS APPROVED IN THE BOARD OF STUDIES MEETING ON 2001 TO BE EFFECTIVE FROM THE ACADEMIC YEAR STRUCTURE AND SYLLABUS APPROVED IN THE BOARD OF STUDIES MEETING ON 2001 TO BE EFFECTIVE FROM THE ACADEMIC YEAR 2000-2001. MCA II SEMESTER Scheme of Evaluation Max. Marks Min. Marks to pass L P C Int. Ext.

More information

Slide 1 Welcome to Fundamentals of Health Workflow Process Analysis and Redesign: Process Mapping: Gane-Sarson Notation. This is Lecture d.

Slide 1 Welcome to Fundamentals of Health Workflow Process Analysis and Redesign: Process Mapping: Gane-Sarson Notation. This is Lecture d. WORKFLOW ANALYSIS Audio Transcript Component 10 Unit 3 Lecture D Fundamentals of Health Workflow Process Analysis & Redesign Interpreting and Creating Process Diagrams Process Mapping Gane-Sarson Notation

More information

Special Section: Building Your Own Compiler

Special Section: Building Your Own Compiler cshtp6_19_datastructures_compiler.fm Page 1 Tuesday, February 14, 2017 10:31 AM 1 Chapter 19 Special Section: Building Your Own Compiler In Exercises8.31 8.33, we introduced Simpletron Machine Language

More information

Knowledge Modeling for Computer Games: Comparative Study

Knowledge Modeling for Computer Games: Comparative Study WDS'13 Proceedings of Contributed Papers, Part I, 42 47, 2013. ISBN 978-80-7378-250-4 MATFYZPRESS Knowledge Modeling for Computer Games: Comparative Study J. Vodrážka Charles University in Prague, Faculty

More information

Compiler Theory. (Semantic Analysis and Run-Time Environments)

Compiler Theory. (Semantic Analysis and Run-Time Environments) Compiler Theory (Semantic Analysis and Run-Time Environments) 005 Semantic Actions A compiler must do more than recognise whether a sentence belongs to the language of a grammar it must do something useful

More information

Interaction Testing. Chapter 15

Interaction Testing. Chapter 15 Interaction Testing Chapter 15 Interaction faults and failures Subtle Difficult to detect with testing Usually seen after systems have been delivered In low probability threads Occur after a long time

More information

Engineering program development. Edited by Péter Vass

Engineering program development. Edited by Péter Vass Engineering program development Edited by Péter Vass Introduction Question: Why engineering program development may be useful for a PhD student in Earth Sciences? Counter-argument: In these days a wide

More information

A Novel Video Retrieval Method to Support a User's Recollection of Past Events Aiming for Wearable Information Playing

A Novel Video Retrieval Method to Support a User's Recollection of Past Events Aiming for Wearable Information Playing A Novel Video Retrieval Method to Support a User's Recollection of Past Events Aiming for Wearable Information Playing Tatsuyuki Kawamura, Yasuyuki Kono, and Masatsugu Kidode Graduate School of Information

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle Partitioning für Einsteiger Hermann Bär Partitioning Produkt Management 2 Disclaimer The goal is to establish a basic understanding of what can be done with Partitioning I want you to start thinking

More information

Visualization of Manufacturing Composite Lay-up Technology by Augmented Reality Application

Visualization of Manufacturing Composite Lay-up Technology by Augmented Reality Application Visualization of Manufacturing Composite Lay-up Technology by Augmented Reality Application JOZEF NOVAK-MARCINCIN, JOZEF BARNA, LUDMILA NOVAKOVA-MARCINCINOVA, VERONIKA FECOVA Faculty of Manufacturing Technologies

More information

h p:// Authors: Tomáš Skopal, Irena Holubová Lecturer: Mar n Svoboda, mar

h p://  Authors: Tomáš Skopal, Irena Holubová Lecturer: Mar n Svoboda, mar B0B36DBS, BD6B36DBS: Database Systems h p://www.ksi.m.cuni.cz/~svoboda/courses/172-b0b36dbs/ Lecture 9 Database Transac ons Authors: Tomáš Skopal, Irena Holubová Lecturer: Mar n Svoboda, mar n.svoboda@fel.cvut.cz

More information

From Event-B Models to Dafny Code Contracts

From Event-B Models to Dafny Code Contracts From Event-B Models to Dafny Code Contracts Mohammadsadegh Dalvandi, Michael Butler, Abdolbaghi Rezazadeh Electronic and Computer Science School, University of Southampton Southampton, United Kingdom {md5g11,mjb,ra3}@ecs.soton.ac.uk

More information

Guidelines Concerning the Transmission, Etc. of Specified Electronic Mail

Guidelines Concerning the Transmission, Etc. of Specified Electronic Mail Guidelines Concerning the Transmission, Etc. of Specified Electronic Mail August 2011 Ministry of Internal Affairs and Communications Telecommunications Bureau Telecommunications Consumer Policy Division

More information

Proving Theorems with Athena

Proving Theorems with Athena Proving Theorems with Athena David R. Musser Aytekin Vargun August 28, 2003, revised January 26, 2005 Contents 1 Introduction 1 2 Proofs about order relations 2 3 Proofs about natural numbers 7 3.1 Term

More information

1 Introduction CHAPTER ONE: SETS

1 Introduction CHAPTER ONE: SETS 1 Introduction CHAPTER ONE: SETS Scientific theories usually do not directly describe the natural phenomena under investigation, but rather a mathematical idealization of them that abstracts away from

More information

1. Let n be a positive number. a. When we divide a decimal number, n, by 10, how are the numeral and the quotient related?

1. Let n be a positive number. a. When we divide a decimal number, n, by 10, how are the numeral and the quotient related? Black Converting between Fractions and Decimals Unit Number Patterns and Fractions. Let n be a positive number. When we divide a decimal number, n, by 0, how are the numeral and the quotient related?.

More information

Trial decision. Appeal No Kyoto, Japan. Tokyo, Japan

Trial decision. Appeal No Kyoto, Japan. Tokyo, Japan Trial decision Appeal No. 2015-8097 Kyoto, Japan Appellant Tokyo, Japan Patent Attorney KYOCERA CORPORATION SUGIMURA, Kenji The case of appeal against the examiner's decision of refusal of Japanese Patent

More information

Computing Submesh Reliability in Two-Dimensional Meshes

Computing Submesh Reliability in Two-Dimensional Meshes Computing Submesh Reliability in Two-Dimensional Meshes Chung-yen Chang and Prasant Mohapatra Department of Electrical and Computer Engineering Iowa State University Ames, Iowa 511 E-mail: prasant@iastate.edu

More information